Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security

被引:9
作者
Said, Wael [1 ,2 ]
Mostafa, Ayman Mohamed [1 ,3 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Zagazig 44519, Egypt
[2] Taibah Univ, Coll Comp Sci & Engn, Medina 42353, Saudi Arabia
[3] Jouf Univ, Coll Comp & Informat Sci, Sakaka 72314, Saudi Arabia
关键词
Immune system; Intrusion detection; Databases; Artificial intelligence; Heuristic algorithms; Clustering algorithms; Danger theory model; artificial immune system; negative selection algorithm; database intrusion detection system; NEGATIVE SELECTION ALGORITHM; INTRUSION DETECTION SYSTEM; DENDRITIC CELL ALGORITHM; NEURAL-NETWORKS; MODEL; AIS; CHALLENGES; SIGNAL; ATTACK;
D O I
10.1109/ACCESS.2020.3015399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required. Intrusion detection systems are utilized to detect, as fast as possible, user's account privilege misuse when a prevention mechanism has failed to address such breaches. In order to address the foremost deficiencies of intrusion detection systems, artificial immune systems are used to tackle these defects. The dynamic and more complex nature of cybersecurity, as well as the high false positive rate and high false negative percentage in current intrusion detection systems, are examples of such deficiency. In this paper, we propose an adaptable efficient database intrusion detection algorithm based on a combination of the Danger Theory model and the Negative Selection algorithm from artificial immune system mechanisms. Experimental results for the implementation of the proposed algorithm provide a self-learning mechanism for achieving high detection coverage with a low false positive rate by using the signature of previously detected intrusions as detectors for the future detection process. The proposed algorithm can enhance detecting insider threats and eliminate data breaches by protecting confidentiality, ensuring integrity, and maintaining availability. To give an integrated picture, a comprehensive and informative survey for the different research directions that are related to the proposed algorithm is performed.
引用
收藏
页码:145332 / 145362
页数:31
相关论文
共 50 条
[31]   The Research of Network Intrusion Detection Based on Danger Theory and Cloud Model [J].
Zhang Ruirui ;
Li Tao ;
Xiao Xin ;
Shi Yuanquan .
2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, :475-478
[32]   A hybrid immune multiobjective optimization algorithm [J].
Chen, Jianyong ;
Lin, Qiuzhen ;
Ji, Zhen .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2010, 204 (02) :294-302
[33]   An immune optimization based real-valued negative selection algorithm [J].
Xiao, Xin ;
Li, Tao ;
Zhang, Ruirui .
APPLIED INTELLIGENCE, 2015, 42 (02) :289-302
[34]   An immune optimization based real-valued negative selection algorithm [J].
Xin Xiao ;
Tao Li ;
Ruirui Zhang .
Applied Intelligence, 2015, 42 :289-302
[35]   Three-level Anomaly Disposal System Model Based on Danger Theory [J].
Fu, Hai-Dong ;
Li, Gui-Feng .
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, :12555-12559
[36]   Immune Clustering-Based Recommendation Algorithm [J].
Liu, Yu ;
Liu, Fengming .
PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, :612-616
[37]   Hybrid Approach of SVM and Feature Selection Based Optimization Algorithm for Big Data Security [J].
Duhan, Bharti ;
Dhankhar, Neetu .
PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 :694-706
[38]   Print-Defect Detection Method Based on the Modified Artificial Immune Algorithm [J].
Zhu, Guanjun ;
Zhou, Shisheng ;
She, Xiaoyan .
ADVANCED GRAPHIC COMMUNICATIONS AND MEDIA TECHNOLOGIES, 2017, 417 :813-823
[39]   A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors [J].
Lu, Tianliang ;
Zhang, Lu ;
Fu, Yixian .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[40]   Improved Genetic Algorithm in Intrusion Detection Model Based on Artificial Immune Theory [J].
Jing Xiaopei ;
Wang Houxiang ;
Han Ruofei ;
Li Juan .
2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, :658-661